The Null Device

Posts matching tags 'twitter'

2013/2/28

As Pope Sidious I Benedict XVI prepares for his last day in office, before taking to the freshly minted office of “Pontiff Emeritus”, someone seemingly hacked his Twitter account, posting over 100 tweets, all in (varying) Latin and addressed to various celebrities and organisations. They were all deleted pretty quickly, but a few choice examples were preserved here:

@BillGates Hey debemus occursum dent. Nos ambae faciunt terribilis products populus coguntur uti.@BillGates Hey we should hang out some time. We both make shitty products people are forced to use.

@charliesheen Hey relinquo in XXXVI horis. Occursum mihi in Vegas cum kilo of cocainum?@charliesheen Hey I get off in 36 hours. Meet me in Vegas with a kilo of blow?

According to this story
a British visitor to the US was arrested and deported after he posted to his Twitter feed that he was planning to "destroy America" and "dig up Marilyn Monroe", immediately flagging him as a terrorist threat.

The Department of Homeland Security flagged him as a potential threat when he posted an excited tweet to his pals about his forthcoming trip to Hollywood which read: 'Free this week, for quick gossip/prep before I go and destroy America'.

If the story is true (and, given that it comes from the Daily Mail, which never lets the facts get in the way of marshalling popular outrage, that is a considerable 'if'), it implies two things:

The US border control agency (not the CIA or NSA or some other super-elite agency that hunts threats through the shadows, but the guys who scan passports) has a feed of intelligence gathered from the public Twitter feeds of anyone seeking to enter the US (and possibly other social media connected to their identities). This has a number of implications: where does the data come from? Is it just what is publicly linked to the poster's profile online, or does it come from clandestine sources (i.e., a list of user-generated content sites posted to from the visitor's home internet connection, as hoovered up by ECHELON)? Is there some NSA supercomputer quietly building up profiles on several billion internet users, with parts of these being sent to border security if some other part of the surveillance apparatus detects a keyphrase (say, the words "destroy America") in a feed linked to a particular individual?

Given the nature of the tweet (which any reasonable person, had they overheard it in a pub, would conclude was a joke), it implies that, as far as the US Department of Homeland Security is concerned, the entire internet is an airport security zone, where joking about, say, carrying bombs or even an absurdity such as destroying America (how exactly would one go about accomplishing this?) is a punishable offence. There is a reason why joking about bombs at airport security screening lines is prohibited; namely that constraining the allowed range of behaviours whilst passing through a security checkpoint allows the checkpoint to operate. This rationale doesn't extend to applying the same rules to any idle banter uttered by a traveller within earshot of electronic intelligence gathering apparatus, and immediately punishing wisecracks.

If this system is as imperfect and prone to false positives as, say, the No-Fly List implemented in the US after 9/11, where people were banned from flying because their names and birthdates were close to those of suspected terrorists or other troublemakers, you can imagine the zany hijinks that might ensue the next time, say, that a business traveller shares a name with a Trotskyist agitator or radical cleric, or just some joker with, shall we say, different standards of self-restraint.

From what I gather, it is very difficult if not impossible for foreign visitors to seek legal redress against the US immigration authorities. More's the pity, as that will allow such absurdities to stand; with no chance of censure, the Homeland Security officials who made the call technically did the right thing, as there is nothing eligible for consideration to balance the (infinitesimally tiny) chance that they might have caught an actual terrorist. (In fact, they might have to deport enough people to exceed airline capacity out of the US and the capacity of airport holding cells for it to register as a problem.) Anyway, it seems that the moral of this story is: if there's any chance of your wanting or needing to visit the United States, don't joke about bombs or terrorism or drugs or non-specific acts of destruction, or indeed anything other that you wouldn't talk about in an airport security queue.

China has launched its own homebrew Twitter clone. It's named Red Microblog, run by a regional propaganda department, and by all accounts, is the place to go if you have some rousing Maoist revolutionary sentiment to share:

"I really like the words by Chairman Mao [Zedong] that 'The world is ours; we should work together'," one of Mr Bo's messages read.
Other messages on the home page included: "Work hard, be honest and treat others well", "There is no sky larger than the hand, no road longer than the feet, no mountain higher than the people, no sea wider than the heart", and "Those who go with the flow are forever going up and down in the waves; only those who go against the wind fearing no hardship, can reach the other side fast."

A statement on the site said the launch had been in response to a call from Li Changchun, China's Propaganda chief, for local governments to master new media.

It's not clear why the organisers were unable to use the UCLOccupation account during the protest; perhaps it coincided with part of Twitter's network being down. The other alternative is that the internet surveillance powers Britain's authorities have allow them to use deep-packet inspection to selectively suppress the traffic of troublemakers as to maintain order, and that the surveillance boxes installed on all internet trunks have facilities to take out Twitter posts in this fashion. That wouldn't explain the non-appearance of the #demo2010 hashtag, though, unless the government's black boxes were designed to suppress posts for everyone but the original poster.

Sony's R&D department has developed a lifeblogging device for cats. Well, not so much for the benefit of the cats, who remain blissfully oblivious of the online world, their social instincts not extending far beyond their sense of smell, but for their owners; think of it as narcissism crossed with Munchausen's by proxy. Anyway, the device is mounted on the cat's collar and contains a camera, an accelerometer and a GPS receiver, and can record your cat's whereabouts and activities and post fixed phrases to Twitter (via a home PC) when specific events happen, infringing on your cat's dignity and civil rights in a formulaically cutesy way:

For example, it is possible to automatically post a comment like "This tastes good" when a cat is eating something.

Bitten by the "new media" bug, the Tories try their hand at this grass-roots web campaign thing, and launch a Web2.0-licious site, with the irreverently catchy title of "Cash Gordon". This site allows Tory supporters to earn "action points" by donating money or spreading the word. Unfortunately for the Tories, some people notice that it looks awfully familiar:

It turns out that Cash Gordon wasn't developed by David Cameron's bright-eyed web whiz-kids, but was a derivative of several web sites from the US Right, including sites against carbon taxes (see fig. 2), health care reform and gay rights, and for the right-wing think tank the Heritage Foundation.

The Tories' misfortune doesn't end there, however. In their haste to embrace the Web and be down with the kids these days, the Tories (or perhaps their American associates) decided to integrate the site with Twitter, and have it automatically display any tweets posted with the #cashgordon tag. It turns out that, in their haste, they didn't anticipate the possibility of basic cross-site scripting attacks, instead displaying HTML tags intact. And it was not long before unsympathetic parties were making the most of it, and potential Tory activists were being rickrolled and Goatse'd.

For what it's worth, Meg Pickard has a graphic of how events unfolded:

Please Rob Me is a web site which aggregates Foursquare location data shared by Twitter users and presents it as "new opportunities" and announcements of users having "left home", to demonstrate the risks of sharing location data with strangers.

While Please Rob Me is a proof of concept, and not particularly useful to burglars (you'd have to map Twitter IDs to names and addresses, and also work out whether there was anybody else living at the premises), there is speculation that social web sites offer a wealth of information to burglars, from users' locations to party photos set inside homes and showing off stealable goods. Of course, these days, the dominant web site is Facebook, which, by default, hides users' posts from people outside of their friend list; however, a significant proportion of Facebook users will gladly friend people they don't actually know, undermining this common-sense measure. (Intuitively, the risk of being burgled or spammed must seem insubstantial to them next to the promise of meeting hot chicks or getting invited to cool parties.) An even larger proportion use Windows PCs which are susceptible to viruses. There is already malware which spams Facebook with phishing links; malware which harvests useful information about all of a user's contacts (real names/identifying details, addresses, links to other social sites, &c.) and uploads them to a criminal-owned server could be just as plausible.

Of course, this makes little economic sense if one imagines one team of burglars going to all this effort to identify easily reachable places likely to house unattended PlayStations or plasma screens. However, if one follows the advice of Adam Smith and introduces division of labour (a practice seen in other criminal enterprises, such as phishing gangs and Nigerian 419 scam operations), it becomes more plausible.

Imagine, if you will, a criminal business intelligence service, much like the ones serving marketers, only specialising in selling leads on potential targets to burglars. This business would have a server somewhere with lax law enforcement, algorithms for harvesting and unifying information from a range of sources (possibly supplemented by human intelligence) and a site for offering bundles of this information to prospective burglars, searchable by geographic location, likely richness of pickings (determinable from the target's employment information, credit ratings and such) and likelihood of them being out of town. The algorithms would pick through a number of public sites, such as Twitter, Foursquare and others (photo sharing sites could be useful; if someone's address is in New York and they just uploaded a fresh photo geotagged in Gran Canaria, they're probably not home), and use them to pick out the likelihood of a target matching various criteria. (The algorithms could be fairly advanced, but as we have seen from the botnet arms race, there's no shortage of ingeniously talented coders of, shall we say, above-average moral flexibility.)

Of course, the real rich pickings are in walled gardens such as Facebook, where people have a sense of security and post their real names, locations and photos; while this is not public, a criminal site could harvest it by using malware (in which case, it'd get not just the details of the owner of the infected PC, but of all their friends), rogue viral Facebook apps or by hiring humans to set up profiles and, using a specially modified browser, friend random strangers ("MAKE MONEY AT HOME SURFING THE WEB!", the recruitment ads could read). The data would go into the criminals' data centre and would come out the other end as searchable packages offered for sale ("Your search of current vacationers making $50k+ near ___ has yielded 37 results, for $100 each. How many would you like to buy?")

Given precedents both in computer crime (credit-card fraud is a big one, having both black-market web sites and highly specialised economies with divisions of labour) and social software, I would be surprised if nobody tries setting something like this up.

Last year, I saw two shows by a brilliant Irish stand-up comedian, David O'Doherty. Today, I find out that he has a Twitter feed. Of course, it's no substitute for a live comedy show, but does feature some amusing and/or surreal lines like:

the best way to impress girls is to brag about things from 1992. Try this: "I have a Swatch." (You'll need a Swatch for this to work)

Search giant Google confirmed to the BBC that when the news first broke it feared it was under attack.

Before the company's servers crashed, TweetVolume noted that "Michael Jackson" appeared in more than 66,500 Twitter updates.

And Farrah Fawcett (whom one really has to feel sorry for; what a way to go) wasn't the only one eclipsed by the "King of Pop" going supernova; the entire Iranian protest movement was as well.

That put news of Jackson's death at least on par with the Iran protests, as Twitter posts about Iran topped 100,000 per hour on June 16 and eventually climbed to 220,000 per hour.

(It's probably, in the Blairite parlance, a good day to bury bad news; I wonder whether the Iranian government has taken advantage of this to hastily machine-gun all those pesky protesters into freshly dug trenches while the world's mourning a pop star.)

Michael Jackson's death will almost certainly go down in history as one of those iconic events that everyone remembers where they were when they heard of it, like the Kennedy assassination or the passing of his erstwhile father-in-law some three decades earlier. Only, this time, it happened in a highly networked world, so the recollections will surely reflect this. I first heard of it when I saw someone log into an instant messaging service with "RIP Michael Jackson" as their status. Though one may well have found out about it by reading Wikipedia's revisions page:

Which is somewhat less ignominious than Wikipedia's summary judgment of non-notability on Steven Wells. (Wikipedia appears to be locked in a deletionist spiral of radicalism these days, as editors prove their hard-headedness and ideological purity by being increasingly ruthless with what is deemed "notable".)

We can expect floods of tributes, detailing how Jackson changed the face of pop music (a reasonable claim) was the biggest record seller in history (probably) and invented the moonwalk (absolutely not).

This will be quickly followed by floods of revelations about the singer's murky private life, now that libel restrictions no longer reply - at least in the UK.

But first of all, we can expect a flood of malware spam, likely promising post-mortem pictures of the star's body.

A lie, Mark Twain wrote, can cross half the world before truth can get its boots on. This may be even more so in the age of Twitter, with its ephemeral, 140-character posts reducing discussion to soundbites with no room for boring old substantiation.
A contributor to the (US Democrat-affiliated) Daily Kos blog has demonstrated this by creating a Twitter feed named InTheStimulus, purporting to reveal the Obama administration's egregious wastes of money, and watching the right-wing Twitterverse pass it on as gospel, giving him virtual high-fives along the way and praising his patriotism.

For the most part, my first couple days of posts were believable, but unsourced lies:
* $3 million for replacement tires for 1992-1995 Geo Metros.
* $750,000 for an underground tunnel connecting a middle school and high school in North Carolina.
* $4.7 million for a program supplying public television to K-8 classrooms.
* $2.3 million for a museum dedicated to the electric bass guitar.

He then proceeded to make the revelations increasingly absurd:

* $473,000 to Fueled by Ramen, record label for such bands as Fall Out Boy.
* $4 million for Obama bobbleheads.
* $104,000 to exhume President Taft.
* $465 million for massive air conditioners to combat global warming.
And finally,
* $855,000 for the gambling debts Laura Bush incurred on diplomatic trips between 2004-2008.

The funny thing was, while a few people dropped his feed, even more started following him and passing on his revelations. It seems that confirmation bias kicked in, and the buzz of having one's beliefs confirmed and outrage justified outweighed the possibility of being taken for a ride.

The Daily Kos' spin on the result is a partisan "conservatives are dumb". Whether or not that is the case, I suspect such an experiment could be repeated with any group invested in a particular belief.

One year ago:

2018/5/13

Well, that's Eurovision for another year. Israel ended up winning, with a studiedly kooky yet impeccably produced electro-pop number, involving dollops of Björkisms, kawaii and chicken impressions. Which was probably more interesting than the two runners-up:

Two years ago:

2017/5/13

The Eurovision final is once again upon us, this time from Kiev. The Ukrainians are making the most of their geopolitical situation, from the slogan, “Celebrate Diversity”, with its dig against its enemy's homophobia. Russia is,

Five years ago:

2014/5/23

As demand for every square inch of space within London keeps rising in the unrelenting property gold rush, the city's realtors have had to find creative ways of packaging the ever-declining scraps of space remaining for